5 Matching Annotations
- Apr 2024
-
www.theguardian.com www.theguardian.com
- Aug 2022
-
medium.com medium.com
-
These attacks affect both the current single-collateral Dai (SCD or ‘Sai’) and the upcoming multi-collateral Dai (MCD) implementations, as well as similar systems with on-chain governance.
51% is not neccesary to manipulate governance to steal the system's collateral.
-
- Nov 2019
-
whitepaper.audius.co whitepaper.audius.co
-
To submit a proposal, a user must bond a set num-ber of Audius tokens (denotedBGP) in the governancesystem, which remain bonded for the duration of theirproposal. Before a proposal's eective date, the origi-nal submitter can also choose to withdraw the proposalif they so choose, returning their bonded tokens. Thisbond is required as an anti-spam measure and to ensurethat proposers to have a sucient stake in the Audiusprotocol to make changes to it. At the proposal's res-olution (successful, failed, or withdrawn), the bond isreturned to proposal submitter.
-
- Apr 2017
-
en.wikipedia.org en.wikipedia.org
-
near the shopping mall
Despite initial reports of multiple attack sites, police could not confirm attacks in any other locations besides the shopping area. https://www.washingtonpost.com/world/german-police-seal-off-mall-area-in-munich-after-shots-fired/2016/07/22/6567e6d8-502c-11e6-a422-83ab49ed5e6a_story.html?utm_term=.181f076b7dc7
Tags
Annotators
URL
-
- Jan 2015
-
newleftreview.org newleftreview.org
-
But a lot was in the open—cyber-attacks by the US government, for example. Already by 2006 or 2007 it was crystal clear that there were dedicated units within the Department of Defense whose job was to take down the websites of jihadists and other foes, even if there was typically tension between the Pentagon and the CIA, which wanted to derive intelligence from them so didn’t want them taken down.
Which has grown into something quite else, because while it may not be possible to control the Internet by controlling every router, it is possible to effectively control the Internet by control the volume and direction of propaganda and cyber attacks. In other words it is possible to have a pivotal influence.
-